dmaasland / mcafee-config-decryptLinks
☆60Updated 5 years ago
Alternatives and similar repositories for mcafee-config-decrypt
Users that are interested in mcafee-config-decrypt are comparing it to the libraries listed below
Sorting:
- Test if an antivirus is installed via the resolution of the service virtual SID☆56Updated 5 years ago
- Babel-Shellfish deobfuscates and scans Powershell scripts on real-time right before each line execution.☆43Updated 6 years ago
- ☆38Updated 5 years ago
- PE File Blessing - To continue or not to continue☆87Updated 5 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆90Updated 5 years ago
- Script that searches through all COM objects for any methods containing a key word of your choosing.☆73Updated 5 years ago
- Exercises for C# Workshop at Wild West Hackin' Fest 2018 & 2019.☆64Updated 5 years ago
- Automation Engine using the Covenant API and lua scripting☆24Updated 2 years ago
- A tool to create COM class/interface relationships in neo4j☆50Updated 2 years ago
- ☆25Updated 4 years ago
- Shim database persistence (Fin7 TTP)☆37Updated 5 years ago
- Library of traffic redirectors☆26Updated 5 years ago
- Ps1jacker is a tool for generating COM Hijacking payload.☆61Updated 3 months ago
- C++ POC code for the wlbsctrl.dll hijack on IKEEXT☆53Updated 6 years ago
- ☆26Updated 6 years ago
- ☆70Updated 6 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆74Updated 5 years ago
- Generate Mimikatz Golden Ticket commands with ease!☆51Updated 4 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 4 years ago
- Initial Commit of Coresploit☆56Updated 3 years ago
- Smart overlay for Cobalt Strike PS function☆31Updated 6 years ago
- Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords☆33Updated 6 years ago
- ☆45Updated 6 years ago
- ☆41Updated 6 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆30Updated 7 years ago
- ☆45Updated 6 years ago
- ☆56Updated 5 years ago
- Iterative AD discovery toolkit for offensive operations☆87Updated 5 years ago
- Walking the PEB in VBA☆23Updated 5 years ago
- ☆28Updated 7 years ago